General

  • Target

    41b81c35a7e3845b2e8c00662fd54e24.exe

  • Size

    512KB

  • Sample

    240101-lsy7xaage3

  • MD5

    41b81c35a7e3845b2e8c00662fd54e24

  • SHA1

    2b89bb74fac9427cb8aaddff3b923518418888a8

  • SHA256

    4ce62b2c6fcd833b8dc4000f79116657a4411f497af73d81fb73ae90bc6d2bb3

  • SHA512

    23ed88ee3e9bc3fdbe4b7e72fbe436e6c91e8d4d41930dee88889db92a8b24bdb929e424343e92d62799ace7731d697adf8d186cff4f8eb659461b4af75389d3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Targets

    • Target

      41b81c35a7e3845b2e8c00662fd54e24.exe

    • Size

      512KB

    • MD5

      41b81c35a7e3845b2e8c00662fd54e24

    • SHA1

      2b89bb74fac9427cb8aaddff3b923518418888a8

    • SHA256

      4ce62b2c6fcd833b8dc4000f79116657a4411f497af73d81fb73ae90bc6d2bb3

    • SHA512

      23ed88ee3e9bc3fdbe4b7e72fbe436e6c91e8d4d41930dee88889db92a8b24bdb929e424343e92d62799ace7731d697adf8d186cff4f8eb659461b4af75389d3

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks